People
Research
Publications
Contact
Rigel Gjomemo
Latest
Poirot: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
ProPatrol: Attack Investigation via Extracted High-Level Tasks
NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
Chainsaw: Chained Automated Workflow-based Exploit Generation
Cite
×